class – xii computer science notes by avinash...

81
AM- www.cs-4u.weebly.com 1 CLASS – XII COMPUTER SCIENCE

Upload: truongxuyen

Post on 15-Mar-2018

218 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: CLASS – XII COMPUTER SCIENCE Notes by Avinash …cs-4u.weebly.com/uploads/3/1/1/7/31171217/mcq_cs_class_xii.pdf · 䅍ⴠ睷眮捳ⴴ甮睥敢汹潭 1 CLASS – XII COMPUTER SCIENCE

AM- www.cs-4u.weebly.com

1

CLASS – XIICOMPUTER SCIENCE

Maurya
Typewritten text
Notes by Avinash Maurya
Page 2: CLASS – XII COMPUTER SCIENCE Notes by Avinash …cs-4u.weebly.com/uploads/3/1/1/7/31171217/mcq_cs_class_xii.pdf · 䅍ⴠ睷眮捳ⴴ甮睥敢汹潭 1 CLASS – XII COMPUTER SCIENCE

AM- www.cs-4u.weebly.com

2

Maurya
Typewritten text
Please go through all the questions carefully. This is made to assist you in your conceptual understanding of concepts. If you find any problem in below questions, please write to me at [email protected] Best of luck for your BOARDS...
Page 3: CLASS – XII COMPUTER SCIENCE Notes by Avinash …cs-4u.weebly.com/uploads/3/1/1/7/31171217/mcq_cs_class_xii.pdf · 䅍ⴠ睷眮捳ⴴ甮睥敢汹潭 1 CLASS – XII COMPUTER SCIENCE

AM- www.cs-4u.weebly.com

3

INDEX

S NO TOPICS PAGE

NO

1 Unit 1 : Programming in C++ 4- 55

2 Unit 2 : Data Structures 56-66

3 Unit 3 : Database and SQL 67-70

4 Unit 4 : Boolean Logic 71-75

5 Unit 5 : Communication and Open

Source Concepts

76 -81

Page 4: CLASS – XII COMPUTER SCIENCE Notes by Avinash …cs-4u.weebly.com/uploads/3/1/1/7/31171217/mcq_cs_class_xii.pdf · 䅍ⴠ睷眮捳ⴴ甮睥敢汹潭 1 CLASS – XII COMPUTER SCIENCE

AM- www.cs-4u.weebly.com

4

UNIT 1 : PROGRAMMING IN C++

OBJECT ORIENTED CONCEPTS (OOPS)

1. The mechanism that binds code and data together and keeps themsecure from outside world is known as

A. AbstractionB. InheritanceC. EncapsulationD. Polymorphism

2. The term __________ means the ability to take many forms.

A. AbstractionB. InheritanceC. EncapsulationD. Polymorphism

3. The members of a class by default are

A. PublicB. ProtectedC. PrivateD. Mandatory to specify

4. It is possible to declare as a friend

A. A member functionB. A global functionC. A classD. All of the above

5. Which of the following statements is NOT valid about operatoroverloading?

A. Only existing operators can be overloadedB. Overloaded operator must have at least one operand of its class

Page 5: CLASS – XII COMPUTER SCIENCE Notes by Avinash …cs-4u.weebly.com/uploads/3/1/1/7/31171217/mcq_cs_class_xii.pdf · 䅍ⴠ睷眮捳ⴴ甮睥敢汹潭 1 CLASS – XII COMPUTER SCIENCE

AM- www.cs-4u.weebly.com

5

typeC. The overloaded operators follow the syntax rules of the original

operatorD. None of the above

6. Polymorphism is implemented through .......

A. Function OverlaodingB. Virtual FunctionsC. Operator OverloadingD. All of these.

7. An object is

A. One instance of a classB. Another word for a classC. A class with static methodD. A method that accesses class

8. A class defined within another class is

A. Nested classB. InheritanceC. ContainershipD. Encapsulation

9. A blueprint of an object in C++ is called a

A. ObjectB. ClassC. InstanceD. None of these

10. At which point of time a variable comes into existence in memory isdetermined by its

A. ScopeB. Storage classC. Data typeD. All of the above

11. Which of the following is false for cin?

A. It represents standard inputB. It is an object of istream class.

Page 6: CLASS – XII COMPUTER SCIENCE Notes by Avinash …cs-4u.weebly.com/uploads/3/1/1/7/31171217/mcq_cs_class_xii.pdf · 䅍ⴠ睷眮捳ⴴ甮睥敢汹潭 1 CLASS – XII COMPUTER SCIENCE

AM- www.cs-4u.weebly.com

6

C. It is a class of which stream is an objectD. Using cin the data can be read from user’s terminal

12. Member functions, when defined within the class specification

A. Are always inlineB. Are not inlineC. Are inline by default, unless they are too big or too complicatedD. Are not inline by default.

13. Access to private data

A. Restricted to methods of the same classB. Restricted to methods of other classesC. Available to methods of the same class and other classesD. Not an issue because the program will not compile

14. C++ was originally developed by

A. Clocksin and MelishB. Donald E.KnuthC. Sir Richard HadleeD. BjarneStroustrup

15. Inheritance is done to

A.Implement real world.B. ReusabilityC. Both A &B.D. None

16. An instance of class is known as.....

A. EntityB. ObjectC. FunctionsD. None

17. Which can be passed as an argument to a function?

A. ConstantB. ExpressionC. Another functionD. All of the above

Page 7: CLASS – XII COMPUTER SCIENCE Notes by Avinash …cs-4u.weebly.com/uploads/3/1/1/7/31171217/mcq_cs_class_xii.pdf · 䅍ⴠ睷眮捳ⴴ甮睥敢汹潭 1 CLASS – XII COMPUTER SCIENCE

AM- www.cs-4u.weebly.com

7

18. Act of representing essential features without including backgrounddetails and explanations is known as ...

A. EncapsulationB. AbstractionC. InheritanceD. Polymorphism

19. Member of a class specified as _______ are accessible only to methodof the class.

A. PrivateB. PublicC. ProtectedD. Derive

20. A class enforces data hiding through .............. and ...........members.

A. PrivateB. PublicC. Private and ProtectedD. Private and Public

21. A struct is the same as a class except that

A. There are no member functionsB. All members are publicC. Cannot be used in inheritance hierarchyD. It does have a this pointer

22. Object is an identifiable ............... with some characteristics andbehaviour.

A. ClassB. InstanceC. EntityD. None

23. A class which can use all the features of an established class,is

A. A static classB. A super classC. A Super Class

Page 8: CLASS – XII COMPUTER SCIENCE Notes by Avinash …cs-4u.weebly.com/uploads/3/1/1/7/31171217/mcq_cs_class_xii.pdf · 䅍ⴠ睷眮捳ⴴ甮睥敢汹潭 1 CLASS – XII COMPUTER SCIENCE

AM- www.cs-4u.weebly.com

8

D. Overloaded

24. The functions which are defined inside the class are known as ....

A. Virtual FunctionsB. Static FunctionsC. Inline FunctionsD. None

25. Which of the following cannot be legitimately passed to a function

A. A constantB. A variableC. A structureD. A header file

26. A function call mechanism that passes arguments to a function bypassing a copy of the values of the arguments is __________

A. Call by nameB. Call by valueC. Call by referenceD. Call by value result

27. A variable defined within a block is visible

A. From the point of definition onward in the programB. From the point of definition onward in the functionC. From the point of definition onward in the blockD. Throughout the function

28. The process of building new classes from existing one is called______.

A. PolymorphismB. StructureC. InheritanceD. Cascading

29. What term is used to describe the internal representation of an objectthat is hidden from view outside the object's definition?

A. PolymorphismB. StructureC. Inheritance

Page 9: CLASS – XII COMPUTER SCIENCE Notes by Avinash …cs-4u.weebly.com/uploads/3/1/1/7/31171217/mcq_cs_class_xii.pdf · 䅍ⴠ睷眮捳ⴴ甮睥敢汹潭 1 CLASS – XII COMPUTER SCIENCE

AM- www.cs-4u.weebly.com

9

D. Data Abstraction

30. Which of the following concepts means wrapping up of data and functionstogether?

A. PolymorphismB. StructureC. InheritanceD. Encapsulation

Page 10: CLASS – XII COMPUTER SCIENCE Notes by Avinash …cs-4u.weebly.com/uploads/3/1/1/7/31171217/mcq_cs_class_xii.pdf · 䅍ⴠ睷眮捳ⴴ甮睥敢汹潭 1 CLASS – XII COMPUTER SCIENCE

AM- www.cs-4u.weebly.com

10

CLASS and OBJECT

1. The members of a class, by default, areA. publicB. protectedC. privateD. mandatory to specify

2. Which of the following statements are true in c++?A. Classes can not have data as public members.B. Structures can not have functions as members.C. Class members are private by default.D. None of these.

3. Member functions, when defined within the class specification:A. are always inline.B. are not inline.C. are inline by default, unless they are too big or too complicated.D. are not inline by default.

4. Which of the following concept of oops allows compiler to insert arguments in afunction call if it is not specified?

A. Call by valueB. Call by referenceC. Default argumentsD. Call by pointer

5. Which of the following term is used for a function declared inside a class?

A. Member Variable

B. Member function

C. Class function

D. Classic function

6. Which of the following is an abstract data type?

A. int B. Double

C. string D. Class

Page 11: CLASS – XII COMPUTER SCIENCE Notes by Avinash …cs-4u.weebly.com/uploads/3/1/1/7/31171217/mcq_cs_class_xii.pdf · 䅍ⴠ睷眮捳ⴴ甮睥敢汹潭 1 CLASS – XII COMPUTER SCIENCE

AM- www.cs-4u.weebly.com

11

7. Which of the following is correct about class and structure?

A. class can have member functions while structure cannot.

B. class data members are public by default while that of structure areprivate.

C. Pointer to structure or classes cannot be declared.

D. class data members are private by default while that of structure arepublic by default.

8. Which of the following two entities (reading from Left to Right) can be connectedby the dot operator?

A. A class member and a class object.

B. A class object and a class.

C. A class and a member of that class.

D. A class object and a member of that class.

9 Which of the following keywords is used to control access to a class member?

A. Default B. Break

C. protected D. Asm

10. Which of the following can access private data members or member functions of aclass?

A. Any function in the program.B. All global functions in the program.C. Any member function of that class.D. Only public member functions of that class.

11. Which of the following also known as an instance of a class?

A. Friend Functions

B. Object

C. Member Functions

D.Member Variables

Page 12: CLASS – XII COMPUTER SCIENCE Notes by Avinash …cs-4u.weebly.com/uploads/3/1/1/7/31171217/mcq_cs_class_xii.pdf · 䅍ⴠ睷眮捳ⴴ甮睥敢汹潭 1 CLASS – XII COMPUTER SCIENCE

AM- www.cs-4u.weebly.com

12

12. Scope resolution operator is represented by

A. ~

B. ::

C. :

D. ;

13. Constructor is executed when _____.

A. an object is created

B. an object is used

C. a class is declared

D. an object goes out of scope.

14. Use of __________ protects data from inadvertent modifications.A. private access specifierB. class protection operator, @C. none of theseD. public access specifier

15. Which of the following statements is correct?

A. Data items in a class must be private.

B. Both data and functions can be either private or public.

C. Member functions of a class must be private.

D. Constructor of a class cannot be private.

16. Which of the following is the only technical difference between structures andclasses in C++?

A. Member function and data are by default protected in structures butprivate in classes.

B. Member function and data are by default private in structures but publicin classes.

C. Member function and data are by default public in structures but privatein classes.

D. Member function and data are by default public in structures butprotected in classes.

17. Which of the following is user defined data type?

Page 13: CLASS – XII COMPUTER SCIENCE Notes by Avinash …cs-4u.weebly.com/uploads/3/1/1/7/31171217/mcq_cs_class_xii.pdf · 䅍ⴠ睷眮捳ⴴ甮睥敢汹潭 1 CLASS – XII COMPUTER SCIENCE

AM- www.cs-4u.weebly.com

13

A. intB. PrivateC. ClassD. A & B Both

18. The Object is not declared for which class?

A. ParentB. BaseC. AbstractD. Derived

19. Data member is also called?

A. AttributeB. MethodC. ClassD. Object

20. A Class can have how many destructors?

A. 1B. 2C. 3D. 4

21. State true of false.i) We cannot make the function inline by defining a function outside the class.ii) A member function can be called by using its name inside another memberfunction of the same class, this is known as nesting of member function.A) True, TrueB) True, FalseC) False, TrueD) False, False

22. …………… is a way to bind the data and its associated functions together which allowsthe data and functions to be hidden.A) StructureB) ClassC) EnumD) Both A and B

23. What happens when we try to compile the class definition in following code snippet?

Page 14: CLASS – XII COMPUTER SCIENCE Notes by Avinash …cs-4u.weebly.com/uploads/3/1/1/7/31171217/mcq_cs_class_xii.pdf · 䅍ⴠ睷眮捳ⴴ甮睥敢汹潭 1 CLASS – XII COMPUTER SCIENCE

AM- www.cs-4u.weebly.com

14

#include<iostream.h>void main()

{class Birds {};

class Peacock : protected Birds {};}

A. It will not compile because class body of Eagle is not defined.

B. It will not compile because a class cannot be protectedly inherited fromother class.

C. It will compile successfully.

D. It will not compile because class body of Birds is not defined.

24. Which of the following can access private data members or member functions of aclass?

A. Any function in the program.

B. All global functions in the program.

C. Any member function of that class.

D. Only public member functions of that class.

25. Which of the following type of data member can be shared by all instances of itsclass?

A. Public

B. Inherited

C. protected

D. Private

26. How many specifiers are present in access specifiers in class?

Page 15: CLASS – XII COMPUTER SCIENCE Notes by Avinash …cs-4u.weebly.com/uploads/3/1/1/7/31171217/mcq_cs_class_xii.pdf · 䅍ⴠ睷眮捳ⴴ甮睥敢汹潭 1 CLASS – XII COMPUTER SCIENCE

AM- www.cs-4u.weebly.com

15

A. 1B. 2C. 3D. 4

27. Which is used to define the member of a class externally?

A. :B. ::C. #D. none of the above

28. What is the output of this program?#include <iostream.h>

classrect{int x, y;public:voidval(int, int);int area (){return(x * y);}};voidrect::val(int a, int b){

x = a;y = b;

}int main (){rectrect;rect.val(3, 4);cout<<"rect area: "<<rect.area();return0;}

A. rect area:12B. rect area: 12C. rect area:24D. rect area:42

29. Which of the following is a valid class declaration?

Page 16: CLASS – XII COMPUTER SCIENCE Notes by Avinash …cs-4u.weebly.com/uploads/3/1/1/7/31171217/mcq_cs_class_xii.pdf · 䅍ⴠ睷眮捳ⴴ甮睥敢汹潭 1 CLASS – XII COMPUTER SCIENCE

AM- www.cs-4u.weebly.com

16

A. class A { int x; };B. class B { }C. public class A { }D. object A { int x; };

30. When struct is used instead of the keyword class means, what will happen in theprogram?

A. access is public by defaultB. access is private by defaultC. access is protected by defaultD. none of the mentioned

31. How to access the members through class object?A. scope resolution operatorB. ternary operatorC. direct member access operator (.)D. none of the mentioned

32. Which of these following members are not accessed by using direct member accessoperator(.)?

A. publicB. privateC. protectedD. Both b & c

33. What is the output of the following program?#include <iostream.h>class Box{public:double length;double breadth;double height;};void main(){

Box Box1;double volume;

Box1.height=5;Box1.length=6;Box1.breadth=7.1;volume = Box1.height* Box1.length* Box1.breadth;

cout<<"Volume of Box1 : "<< volume <<endl;}A. 210

Page 17: CLASS – XII COMPUTER SCIENCE Notes by Avinash …cs-4u.weebly.com/uploads/3/1/1/7/31171217/mcq_cs_class_xii.pdf · 䅍ⴠ睷眮捳ⴴ甮睥敢汹潭 1 CLASS – XII COMPUTER SCIENCE

AM- www.cs-4u.weebly.com

17

B. 213C. 215

D. 217

34. What is the output of the program?#include <iostream.h>

classRect{int x, y;public:voidset_values(int,int);int area (){return(x * y);}};voidRect::set_values(int a, int b){

x = a;y = b;

}int main (){Rect recta, rectb;recta.set_values(5, 6);rectb.set_values(7, 6);cout<<"recta area: "<<recta.area();cout<<"rectb area: "<<rectb.area();return0;}

A. recta area: 30 rectb area: 42B. recta area: 20 rectb area: 34C. recta area: 30 rectb area: 21D. none of the mentioned

35. How many objects can created of a class?A. 1B. 2C. 3D. as many as possible

Page 18: CLASS – XII COMPUTER SCIENCE Notes by Avinash …cs-4u.weebly.com/uploads/3/1/1/7/31171217/mcq_cs_class_xii.pdf · 䅍ⴠ睷眮捳ⴴ甮睥敢汹潭 1 CLASS – XII COMPUTER SCIENCE

AM- www.cs-4u.weebly.com

18

36. Pick out the other definition of objects.A. member of the classB. associate of the classC. attribute of the classD. instance of the class

37. What is the output of this program?#include <iostream.h>class sample{private:intvar;public:void input(){cout<<var;}void output(){cout<<"Variable entered is ";cout<<var<<"\n";}};void main(){

sample object;object.var=5;object.input();object.output();

}A. Variable entered is 5B. runtime errorC. private member access by objectD. none of the mentioned

38. Which special character is used to mark the end of class?A. ;B. :C. #D. $

39. What is the output of this program?

Page 19: CLASS – XII COMPUTER SCIENCE Notes by Avinash …cs-4u.weebly.com/uploads/3/1/1/7/31171217/mcq_cs_class_xii.pdf · 䅍ⴠ睷眮捳ⴴ甮睥敢汹潭 1 CLASS – XII COMPUTER SCIENCE

AM- www.cs-4u.weebly.com

19

#include <iostream.h>

class number{inti;public:intgeti();voidputi(int j);};int number::geti(){returni;}void number::puti(int j){i= j;}void main(){

number s;s.puti(10);cout<<s.geti();}

A. 10B. 11C. 20D. 22

40. Which is true for this keyword

A. this.memberB. this->memberC. this*.memberD. *this.member

Page 20: CLASS – XII COMPUTER SCIENCE Notes by Avinash …cs-4u.weebly.com/uploads/3/1/1/7/31171217/mcq_cs_class_xii.pdf · 䅍ⴠ睷眮捳ⴴ甮睥敢汹潭 1 CLASS – XII COMPUTER SCIENCE

AM- www.cs-4u.weebly.com

20

CONSTRUCTORS & DESTRUCTORS

1. Which of the following is not a type of constructor?A. Copy constructorB. Friend constructorC. Default constructorD. Parameterized constructor

2. Which of the following statement is correct?A. A constructor is called at the time of declaration of an object.B. A constructor is called at the time of use of an object.C. A constructor is called at the time of declaration of a class.D. A constructor is called at the time of use of a class.

3. Which of the following is correct about function overloading?A. The types of arguments are different.B. The order of argument is different.C. The number of argument is same.D. Both A and B.

4. Given a class named Book, which of the following is not a validconstructor?

A. Book ( ) { }

B. Book ( Book b) { }

C. Book ( Book &b) { }

D. Book (char* author, char* title) { }

5. How many constructors can a class have?A. 0

B. 1

C. 2

D. any number

6. Which of the following is not the characteristic of constructor.A. They should be declared in the public section.

B. They do not have return type.

C. They can not be inherited.

D. They can’t be of same name as that of a class.

Page 21: CLASS – XII COMPUTER SCIENCE Notes by Avinash …cs-4u.weebly.com/uploads/3/1/1/7/31171217/mcq_cs_class_xii.pdf · 䅍ⴠ睷眮捳ⴴ甮睥敢汹潭 1 CLASS – XII COMPUTER SCIENCE

AM- www.cs-4u.weebly.com

21

7. A copy constructor takesA. no argument

B. one argument

C. two arguments

D. arbitrary no. of arguments

8. A constructor that accepts __________ parameters is called the defaultconstructor.

A. one B. two

C. no D. five

9. What happens when a class with parameterized constructors and having nodefault constructor is used in a program and we create an object with no-arguments?

A. Compile-time error.

B. Preprocessing error.

C. Runtime error.

D. Runtime exception.

10. Destructor has the same name as the constructor and it is preceded by______ .

A. ! B. ?

C. ~ D. &

11. Constructors and destructors are called implicitly when the objects of theclass is .....

A. Created and releases memory

B. inherit parent class

C. are constructed

D. are destroyed

Page 22: CLASS – XII COMPUTER SCIENCE Notes by Avinash …cs-4u.weebly.com/uploads/3/1/1/7/31171217/mcq_cs_class_xii.pdf · 䅍ⴠ睷眮捳ⴴ甮睥敢汹潭 1 CLASS – XII COMPUTER SCIENCE

AM- www.cs-4u.weebly.com

22

12. Which constructor function is designed to copy objects of the same classtype?

A. Create constructor

B. Object constructor

C. Dynamic constructor

D. Copy constructor

13. Which of the following statement is correct?

A. Constructor has the same name as that of the class.

B. Destructor has the same name as that of the class with a tildesymbol at the beginning.

C. Both A and B.

D. Destructor has the same name as the first member function ofthe class.

14. Which of the following statement is incorrect?

A. Constructor is a member function of the class.

B. The compiler always provides a zero argument constructor.

C. It is necessary that a constructor in a class should always bepublic.

D. Both B and C.

15. When are the Global objects destroyed?

A. When the control comes out of the block in which they are beingused.

B. When the program terminates.

C. When the control comes out of the function in which they arebeing used.

D. As soon as local objects die.

Page 23: CLASS – XII COMPUTER SCIENCE Notes by Avinash …cs-4u.weebly.com/uploads/3/1/1/7/31171217/mcq_cs_class_xii.pdf · 䅍ⴠ睷眮捳ⴴ甮睥敢汹潭 1 CLASS – XII COMPUTER SCIENCE

AM- www.cs-4u.weebly.com

23

16. Copy constructor must receive its arguments by __________ .

A. either pass-by-value or pass-by-reference

B. only pass-by-value

C. only pass-by-reference

D. only pass by address

17. A function with the same name as the class, but preceded with a tildecharacter (~) is called __________ of that class.

A. constructor B. destructor

C. function D. object

18. Which of the following gets called when an object goes out of scope?

A. constructor

B. destructor

C. main

D. virtual function

19. Which of the following statement is correct?

A. Destructor destroys only integer data members of the object.

B. Destructor destroys only float data members of the object.

C. Destructor destroys only pointer data members of the object.

D. Destructor destroys the complete object.

20. __________ is used to make a copy of one object to another object ofthe same class type.

A. constructor

B. copy constructor

C. destructor

D. default constructor

Page 24: CLASS – XII COMPUTER SCIENCE Notes by Avinash …cs-4u.weebly.com/uploads/3/1/1/7/31171217/mcq_cs_class_xii.pdf · 䅍ⴠ睷眮捳ⴴ甮睥敢汹潭 1 CLASS – XII COMPUTER SCIENCE

AM- www.cs-4u.weebly.com

24

21. Constructors __________ to create objects in different ways.

A. cannot overloaded

B. can be overloaded

C. can be called

D. can be nested

22. Which of the following statement is correct?

A. A destructor has the same name as the class in which it ispresent.

B. A destructor has a different name than the class in which it ispresent.

C. A destructor always returns an integer.

D. A destructor can be overloaded.

23. Which of the following are NOT provided by the compiler by default?

A. Zero-argument Constructor

B. Destructor

C. Copy Constructor

D. A & B

24. It is a __________ error to pass arguments to a destructor.

A. logical B. virtual

C. syntax D. linker

25. If the programmer does not explicitly provide a destructor, then which ofthe following creates an empty destructor?

A. Preprocessor

B. Compiler

C. Linker

D. main() function

26. A constructor having parameters with default values is known as ..........

Page 25: CLASS – XII COMPUTER SCIENCE Notes by Avinash …cs-4u.weebly.com/uploads/3/1/1/7/31171217/mcq_cs_class_xii.pdf · 䅍ⴠ睷眮捳ⴴ甮睥敢汹潭 1 CLASS – XII COMPUTER SCIENCE

AM- www.cs-4u.weebly.com

25

A. default constructor

B. copy constructor

C. Constructor with default values.

D. None of these

27. How many default constructors per class are possible?

A. Only one

B. Two

C. Three

D. Unlimited

28. Which of the following statement is correct about destructors?

A. A destructor has void return type.

B. A destructor has integer return type.

C. A destructor has no return type.

D. A destructors return type is always same as that of main().

29. Which of the following statement is correct?

A. A constructor has the same name as the class in which it ispresent.

B. A constructor has a different name than the class in which it ispresent.

C. A constructor always returns an integer.

D.A constructor cannot be overloaded.

30. Which of the following implicitly creates a default constructor when theprogrammer does not explicitly define at least one constructor for a class?

Page 26: CLASS – XII COMPUTER SCIENCE Notes by Avinash …cs-4u.weebly.com/uploads/3/1/1/7/31171217/mcq_cs_class_xii.pdf · 䅍ⴠ睷眮捳ⴴ甮睥敢汹潭 1 CLASS – XII COMPUTER SCIENCE

AM- www.cs-4u.weebly.com

26

A. Preprocessor B. Linker

C. Loader D. Compiler

E.

31. A destructor takes __________ arguments.

A. one B. two

C. three D. no

32. Destructor calls are made in which order of the corresponding constructorcalls?

A. Reverse order

B. Forward order

C. Depends on how the object is constructed

D. Depends on how many objects are constructed

33. Which of the following never requires any arguments?

A. Member function

B. Friend function

C. Default constructor

D. const function

34. A class's __________ is called when an object is destroyed.

A. constructor

B. destructor

C. assignment function

D.copy constructor

35. Destructors __________ automatically when the program terminates witha call to function exit or function abort.

Page 27: CLASS – XII COMPUTER SCIENCE Notes by Avinash …cs-4u.weebly.com/uploads/3/1/1/7/31171217/mcq_cs_class_xii.pdf · 䅍ⴠ睷眮捳ⴴ甮睥敢汹潭 1 CLASS – XII COMPUTER SCIENCE

AM- www.cs-4u.weebly.com

27

A. are called

B. are inherited

C. are not called

D. are created

36. Which of the following statement is correct?

A. A constructor of a derived class can access any public andprotected member of the base class.

B. Constructor cannot be inherited but the derived class can callthem.

C. A constructor of a derived class cannot access any public andprotected member of the base class.

D. Both A and B

37. Which of the following statements are correct?

A. Constructor is always called explicitly.

B. Constructor is called either implicitly or explicitly, whereasdestructor is always called implicitly.

C. Destructor is always called explicitly.

D. Constructor and destructor functions are not called at all as theyare always inline.

38. How many times a constructor is called in the life-time of an object?

A. Only once

B. Twice

C. Thrice

D. Depends on the way of creation of object

39. Which of the following statement is correct about constructors?

Page 28: CLASS – XII COMPUTER SCIENCE Notes by Avinash …cs-4u.weebly.com/uploads/3/1/1/7/31171217/mcq_cs_class_xii.pdf · 䅍ⴠ睷眮捳ⴴ甮睥敢汹潭 1 CLASS – XII COMPUTER SCIENCE

AM- www.cs-4u.weebly.com

28

A. A constructor has a return type.

B. A constructor cannot contain a function call.

C. A constructor has no return type.

D. A constructor has a void return type.

40. Which of the following statement is correct whenever an object goes outof scope?

A. The default constructor of the object is called.

B. The parameterized destructor is called.

C. The default destructor of the object is called.

D. None of the above.

41. Answer the questions (i) and (ii) after going through the following program

#include<iostream.h>#include<string.h>class Bazar{

char Type[20];char Product[20];int Qty;float Price;Bazar() //Function 1{

strcpy (Type,”Electronic”);strcpy (Product,”Calculator”);Qty = 10;Price=225;

}

public:void Disp( ) //Function 2{

cout<<Type<<”-“<<Product<<”:“<<Qty<<”@“<<Price<<endl;}

};void main( )

Page 29: CLASS – XII COMPUTER SCIENCE Notes by Avinash …cs-4u.weebly.com/uploads/3/1/1/7/31171217/mcq_cs_class_xii.pdf · 䅍ⴠ睷眮捳ⴴ甮睥敢汹潭 1 CLASS – XII COMPUTER SCIENCE

AM- www.cs-4u.weebly.com

29

{Bazar B; //Statement 1B.Disp(); //Statement 2

}

(i) Will Statement 1 initialize all the data members for object Bwith the values given in the Function 1? Justify your answersuggesting the correction(s) to be made in the above code.

A. YesB. No

(ii) What shall be the possible output when the program getsexecuted? (Assuming, if required – the suggested correction(s)are made in the program).

A. Electronic-Calculator:10@225B. Electronic Calculator ::10@250C. Electronic Calculator :10@250D. Electronic-Calculator::10@225

42. Answer the questions (i) and (ii) after going through the followingclass:class Seminar{

int Time;public:

Seminar() //Function 1{

Time=30;cout<<”Seminar starts now”<<end1;}

void Lecture() //Function 2{

cout<<”Lectures in the seminar on”<<end1;}

Seminar(int Duration) //Function 3{

Time=Duration;cout<<”Seminar starts now”<<end1;}

~Seminar() //Function 4

Page 30: CLASS – XII COMPUTER SCIENCE Notes by Avinash …cs-4u.weebly.com/uploads/3/1/1/7/31171217/mcq_cs_class_xii.pdf · 䅍ⴠ睷眮捳ⴴ甮睥敢汹潭 1 CLASS – XII COMPUTER SCIENCE

AM- www.cs-4u.weebly.com

30

{cout<<”Vote of thanks”<<end1;

}};

(i) In Object Oriented Programming, what is Function 4 referred as?

A. Copy Constructor

B. Constructor

C. Destructor

D. Default Constructor

(ii) In Object Oriented Programming, when does Function 4 getinvoked/called?

A. When user calls it.

B. It is invoked as soon as the scope of the object gets over.

C. It can’be invoked.

D. A & C

(iii) In Object Oriented Programming, which concept is illustratedby Function 1 and Function 3 together? Write an exampleillustrating the calls for these functions.

A. InheritanceB. EncapsulationC. Constructor Overloading (Polymorphism)D. Data hiding

(iv) What is the correct code to call Function 1?A. Seminar S1B. Seminar S1;C. S1;D. A & C

(v) What is the correct code to call Function 3?

Page 31: CLASS – XII COMPUTER SCIENCE Notes by Avinash …cs-4u.weebly.com/uploads/3/1/1/7/31171217/mcq_cs_class_xii.pdf · 䅍ⴠ睷眮捳ⴴ甮睥敢汹潭 1 CLASS – XII COMPUTER SCIENCE

AM- www.cs-4u.weebly.com

31

A. Seminar S2(90);B. Seminar S2;C. S2;D. B & C

43. In which case is it mandatory to provide a destructor in a class?A. Almost in every class

B. Class for which two or more than two objects will be created

C. Class for which copy constructor is defined

D. Class whose objects will be created dynamically

44 Constructor Overloading implements ............... feature of OOPsA. PolymorphismB. InheritanceC. AbstractionD. None

45 What happens when following statements are executes assuming Book is aclassBook a,b;--------a=b;

A. Copy Constructor is called.B. Default ConstructorC. Assignment OperationD. None

Page 32: CLASS – XII COMPUTER SCIENCE Notes by Avinash …cs-4u.weebly.com/uploads/3/1/1/7/31171217/mcq_cs_class_xii.pdf · 䅍ⴠ睷眮捳ⴴ甮睥敢汹潭 1 CLASS – XII COMPUTER SCIENCE

AM- www.cs-4u.weebly.com

32

INHERITANCE

1. The process of building new classes from existing one is called ______.

E. PolymorphismF. StructureG. InheritanceH. Cascading

2. Mechanism of deriving a class from another derived class is known as____

A. PolymorphismB. Single InheritanceC. Multilevel InheritanceD. Message Passing

3. If a class C is derived from class B, which is derived from class A, all throughpublic inheritance, then a class C member function can access

A. Protected and public data only in C and BB. Protected and public data only in CC. Private data in A and BD. Protected data in A and B

4. The base class access specification determines how ___________ members inthe base class may be accessed by derived classes.

A. PrivateB. PublicC. ProtectedD. All of the above

5. A base class may also be called a

A. Child classB. SubclassC. Derived classD. Parent class

6. Which of the statements are true ?I. Function overloading is done at compile time.II. Protected members are accessible to the member of derived class.III. A derived class inherits constructors and destructors.

Page 33: CLASS – XII COMPUTER SCIENCE Notes by Avinash …cs-4u.weebly.com/uploads/3/1/1/7/31171217/mcq_cs_class_xii.pdf · 䅍ⴠ睷眮捳ⴴ甮睥敢汹潭 1 CLASS – XII COMPUTER SCIENCE

AM- www.cs-4u.weebly.com

33

IV. A friend function can be called like a normal function.V. Nested class is a derived class.

A. I, II, IIIB. II, III, VC. III, IV, VD. I, II, IV

7. In multiple inheritance -

A. The base classes must have only default constructorsB. Cannot have virtual functionsC. Cannot have virtual classesD. None of the above

8. When a sub class is inherited from only one super class .It is known as

A. Single inheritanceB. Multiple inheritanceC. Hierarchical inheritanceD. Multilevel inheritance

9. _________ members of a base class are never accessible to a derived class.

A. PrivateB. PublicC. ProtectedD. All of the above

10. What part of object-oriented technology defines superclass and subclassrelationships?

A. InheritanceB. Scalability

C. EncapsulationD. Polymorphism

11. In a student grading system, objects from different classes communicate witheach other. These communications are known as _____.

A. InheritanceB. Scalability

C. EncapsulationD. Polymorphism

Page 34: CLASS – XII COMPUTER SCIENCE Notes by Avinash …cs-4u.weebly.com/uploads/3/1/1/7/31171217/mcq_cs_class_xii.pdf · 䅍ⴠ睷眮捳ⴴ甮睥敢汹潭 1 CLASS – XII COMPUTER SCIENCE

AM- www.cs-4u.weebly.com

34

12. What common technique attempts to save time and energy by reducing redundantwork in object-oriented programming?

A. Reduce lines of programmingB. Reuse of codeC. Reduce size of systems being developedD. Merging different systems together

13. Which of the following term is used for a function defined inside a class?A. Member VariableB. Member functionC. Class functionD. Classic function

14. Which of the following is the valid class declaration header for the derived class bwith base class a and derived class c with base class b?

A. class b : public a { }; class c : public b{ };B. class d : class b1, class b2C. class a : public b { }; class b : public c{ };D. class d : b1, b2E.

15. Which of the statements is true in a protected derivation of a derived class from abase class?

A. Private members of the base class become protected members of thederived class

B. Protected members of the base class become public members of the derivedclass

C. Public members of the base class become protected members of the derivedclass

D. Protected derivation does not affect private and protected members of thederivedclass.

16. Which of the following is the valid class declaration header for the derived class dwith base classesb1 and b2?

A. class d : public b1, public b2B. class d : class b1, class b2C. class d : public b1, b2D. class d : b1, b2

Page 35: CLASS – XII COMPUTER SCIENCE Notes by Avinash …cs-4u.weebly.com/uploads/3/1/1/7/31171217/mcq_cs_class_xii.pdf · 䅍ⴠ睷眮捳ⴴ甮睥敢汹潭 1 CLASS – XII COMPUTER SCIENCE

AM- www.cs-4u.weebly.com

35

17. The major goal of inheritance in c++ is:A. To facilitate the conversion of data types.B. To help modular programming.C. To extend the capabilities of a class.D. To hide the details of base class.

18. Consider the following class definitions:class a{};class b: protected a{};What happens when we try to compile this class?

A. Will not compile because class body of a is not defined.B. Will not compile because class body of b is not defined.C. Will not compile because class a is not public inherited.D. Will compile successfully.

19. In access control in a protected derivation, visibility modes will change as follows:A. private, public and protected become protectedB. only public becomes protected.C. public and protected become protected.D. only private becomes protected.

20. Which allows you to create a derived class that inherits properties from more thanone base class?

A. Multilevel inheritanceB. Multiple inheritanceC. Hybrid InheritanceD. Hierarchical Inheritance

21. Which feature in OOP allows reusing code?A. PolymorphismB. InheritanceC. EncapsulationD. Data hiding

22. To hide a data member from the program, you must declare the data member in the_____ section of the class

A. concealedB. confidentialC. hiddenD. private

Page 36: CLASS – XII COMPUTER SCIENCE Notes by Avinash …cs-4u.weebly.com/uploads/3/1/1/7/31171217/mcq_cs_class_xii.pdf · 䅍ⴠ睷眮捳ⴴ甮睥敢汹潭 1 CLASS – XII COMPUTER SCIENCE

AM- www.cs-4u.weebly.com

36

23. When you derive a class privately, a protected base class member becomesA. privateB. publicC. not inheritedD. protected

24. Irrespective of type of derivation__________members of a base class arenever accessible in derived class.

A. (b), (d) and (e)B. privateC. none of theseD. protectedE. public

25. A class inherited from an existing class is known as _____________.A. derived classB. inheriteeC. child classD. A and C

26. When two or more classes serve as base class for a derived class, the situation isknown as __________.

A. multiple inheritanceB. polymorphismC. encapsulationD. None of these

27.Which type of inheritance is depicted in the given example?class school : public student, private teacher

A. Multilevel InheritanceB. Multiple InheritanceC. Single Level InheritanceD. None of these

28. When derived class and base classes both contain constructors, the baseconstructor is executed first and then the constructor in the derived class isexecuted.

A. TrueB. FalseC. All of the aboveD. None of the above

Page 37: CLASS – XII COMPUTER SCIENCE Notes by Avinash …cs-4u.weebly.com/uploads/3/1/1/7/31171217/mcq_cs_class_xii.pdf · 䅍ⴠ睷眮捳ⴴ甮睥敢汹潭 1 CLASS – XII COMPUTER SCIENCE

AM- www.cs-4u.weebly.com

37

29. How Many bytes will be required by an object of the class SHOP?class CUSTOMER{intCust_no;char Cust_Name[20];};class SALESMAN{intSalesman_no;char Salesman_Name[20];protected:float Salary;};class SHOP : private CUSTOMER, public SALESMAN{char Voucher_No[10];char Sales_Date[8];};

A. 56 bytesB. 18 bytesC. 88 bytesD. 66 bytes

30. Which type of inheritance is shown in the following example?class olympics{int no_of_events; char country_name[25];};class outdoorgame : public olympics{char eventname[20];inteventcode;};class hockey : public outdoorgame{intno_of_players;char venue[25];};

A. Multilevel InheritanceB. Multiple InheritanceC. Single Level Inheritance

Page 38: CLASS – XII COMPUTER SCIENCE Notes by Avinash …cs-4u.weebly.com/uploads/3/1/1/7/31171217/mcq_cs_class_xii.pdf · 䅍ⴠ睷眮捳ⴴ甮睥敢汹潭 1 CLASS – XII COMPUTER SCIENCE

AM- www.cs-4u.weebly.com

38

D. None of these31. consider the following class declaration and answer the question below :

class university {

intnoc;

protected;

char uname[25];

public:

university();

char state[25];

};

class college:public university{

int nod;

char cname[25];

public:

college();

};

class department:public college{

char dname[25];

intnof;

public:

department();

};

Which class’s constructor will be called first at the time of declaration of an

object of class department?

A. university

B. department

C. college

D. No class constructor will be called

Page 39: CLASS – XII COMPUTER SCIENCE Notes by Avinash …cs-4u.weebly.com/uploads/3/1/1/7/31171217/mcq_cs_class_xii.pdf · 䅍ⴠ睷眮捳ⴴ甮睥敢汹潭 1 CLASS – XII COMPUTER SCIENCE

AM- www.cs-4u.weebly.com

39

32. consider the following class declaration and answer the question below :

class university {

int noc;

protected;

char uname[25];

public:

university();

char state[25];

};

class college:public university{

int nod;

char cname[25];

public:

college();

};

class department:public college{

char dname[25];

intnof;

public:

department();

};

(i) How many bytes does an object belonging to class college, university

and department require respectively?

A. 79, 52,106

B. 52,106,79

C. 106,79,52

D. 79,54,106

Page 40: CLASS – XII COMPUTER SCIENCE Notes by Avinash …cs-4u.weebly.com/uploads/3/1/1/7/31171217/mcq_cs_class_xii.pdf · 䅍ⴠ睷眮捳ⴴ甮睥敢汹潭 1 CLASS – XII COMPUTER SCIENCE

AM- www.cs-4u.weebly.com

40

(ii) Which data member will be accessible from the object of class

department?

A. noc

B. dname

C. nof

D. state

33. What is the output of this program?#include <iostream.h>class A{public:

A(int n ){cout<< n;}};class B:public A{public:

B(int n, double d): A(n){cout<< d;}};class C:public B{public:

C(int n, double d, charch): B(n, d){cout<<ch;}};int main(){

C c(5, 4.3, 'R');

Page 41: CLASS – XII COMPUTER SCIENCE Notes by Avinash …cs-4u.weebly.com/uploads/3/1/1/7/31171217/mcq_cs_class_xii.pdf · 䅍ⴠ睷眮捳ⴴ甮睥敢汹潭 1 CLASS – XII COMPUTER SCIENCE

AM- www.cs-4u.weebly.com

41

return0;}

A. 54.3R

B. R4.35

C. 4.3R5

D. None of the mentioned

34. What is the output of this program?#include <iostream.h>

classBaseClass{protected:inti;public:BaseClass(int x){i= x;}

~BaseClass(){}};classDerivedClass:publicBaseClass{int j;public:DerivedClass(int x, int y):BaseClass(y){

j = x;}

~DerivedClass(){}void show(){cout<<i<<" "<< j <<endl;}};

Page 42: CLASS – XII COMPUTER SCIENCE Notes by Avinash …cs-4u.weebly.com/uploads/3/1/1/7/31171217/mcq_cs_class_xii.pdf · 䅍ⴠ睷眮捳ⴴ甮睥敢汹潭 1 CLASS – XII COMPUTER SCIENCE

AM- www.cs-4u.weebly.com

42

int main(){DerivedClassob(3, 4);ob.show();return0;}

A. 3 4B. 4 3C. 4D. 3

35 What is the output of this program?#include <iostream.h>

class Base{public:int m;

Base(int n=0): m(n){cout<<"Base"<<endl;}};class Derived:public Base{public:double d;

Derived(double de =0.0): d(de){cout<<"Derived"<<endl;}};int main(){cout<<"Instantiating Base"<<endl;

Base cBase;cout<<"Instantiating Derived"<<endl;

Derived cDerived;return0;

Page 43: CLASS – XII COMPUTER SCIENCE Notes by Avinash …cs-4u.weebly.com/uploads/3/1/1/7/31171217/mcq_cs_class_xii.pdf · 䅍ⴠ睷眮捳ⴴ甮睥敢汹潭 1 CLASS – XII COMPUTER SCIENCE

AM- www.cs-4u.weebly.com

43

}

A. Instantiating BaseBaseInstantiating DerivedBaseDerived

B. Instantiating BaseInstantiating DerivedBaseDerived

C. Instantiating BaseBaseInstantiating DerivedBase

D. None of the mentioned

36.What is the output of this program?

#include <iostream.h>class Parent{public:

Parent (void){cout<<"Parent()\n";}

Parent (inti){cout<<"Parent("<<i<<")\n";};

Parent (void){cout<<"~Parent()\n";};};

Page 44: CLASS – XII COMPUTER SCIENCE Notes by Avinash …cs-4u.weebly.com/uploads/3/1/1/7/31171217/mcq_cs_class_xii.pdf · 䅍ⴠ睷眮捳ⴴ甮睥敢汹潭 1 CLASS – XII COMPUTER SCIENCE

AM- www.cs-4u.weebly.com

44

class Child1 :public Parent {};class Child2 :public Parent{public:

Child2 (void){cout<<"Child2()\n";}

Child2 (inti): Parent (i){cout<<"Child2("<<i<<")\n";}

~Child2 (void){cout<<"~Child2()\n";}};int main (void){

Child1 a;Child2 b;Child2 c(42);

return0;}A. Parent()

Parent()

Child2()

Parent(42)

Child2(42)

~Child2()

~Parent()

~Child2()

~Parent()

~Parent()

B. Error C. runtime error D. None of the mentioned

Page 45: CLASS – XII COMPUTER SCIENCE Notes by Avinash …cs-4u.weebly.com/uploads/3/1/1/7/31171217/mcq_cs_class_xii.pdf · 䅍ⴠ睷眮捳ⴴ甮睥敢汹潭 1 CLASS – XII COMPUTER SCIENCE

AM- www.cs-4u.weebly.com

45

Data File Handling

Q1 Which enables a program to store the data permanently on secondarystorage devices

(a) monitor (b) printer(c) file (d ) None of these

Q2 A collection of related data stored on some storage devices such as ahard disk, magnetic tape or floppy disk.

(a) program (b) process(c) file (d ) None of these

Q3 Data files can be classified as(a) Text File (b) Binary File(c) Both (a) & (b) (d ) None of these

Q4 The files that store data in the form of binary digits are known as(a) Text File (b) Binary File(c) Both (a) & (b) (d ) None of these

Q5 The files that store data as strings of characters are known as(a) Text File (b) Binary File(c) Both (a) & (b) (d ) None of these

Q6 A flow of data in the form of a sequence of bytes is known asThe files that store data in the form of binary digits are known as

(a) word (b) string(c) stream (d ) None of these

Q7 The stream that reads the data from the device and supplies it to theprogram is known as

(a) input stream (b) output stream(c) Both (a) & (b) (d ) None of these

Q8 The stream that receives data from the program and writes it to thedevice is known as

(a) input stream (b) output stream(c) Both (a) & (b) (d ) None of these

Q9 Which one is file input stream class(a) ifstream (b) ofstream(c) both (a) & (b) (d ) None of these

Q10 Which one is file output stream class(a) ifstream (b) ofstream(c) both (a) & (b) (d ) None of these

Q11 Which is both file input and output stream class(a) ifstream (b) ofstream(c) fstream (d ) None of these

Page 46: CLASS – XII COMPUTER SCIENCE Notes by Avinash …cs-4u.weebly.com/uploads/3/1/1/7/31171217/mcq_cs_class_xii.pdf · 䅍ⴠ睷眮捳ⴴ甮睥敢汹潭 1 CLASS – XII COMPUTER SCIENCE

AM- www.cs-4u.weebly.com

46

Q12 A file can be opened by(a) constructor (b) open( )(c) both (a) & (b) (d ) None of these

Q13 Two or more file modes can be combined using the operator(a) bitwise OR (|) (b) bitwise AND ( &)(c) both (a) & (b) (d ) None of these

Q14 The default mode for the ifstream class is(a) ios::in (b) ios::out(c) both (a) & (b) (d ) None of these

Q15 The default mode for the ifstream class is(a) ios::in (b) ios::out(c) both (a) & (b) (d ) None of these

Q16 By default all files are open in which mode(a) text mode (b) binary(c) both (a) & (b) (d ) None of these

Q17 The open in which mode is compulsory to close the file by close( ) method(a) constructor (b) open( )(c) both (a) & (b) (d ) None of these

Q18 Which method is used to read the data from a file(a) get( ) (b) read( )(c) both (a) & (b) (d ) None of these

Q19 Which method is used to write the data to the file(a) put( ) (b) write( )(c) both (a) & (b) (d ) None of these

Q20 The current position of a get pointer can be known by using(a) tellg( ) (b) tellp( )(c) seekg( ) (d ) seekp( )

Q21 The current position of a put pointer can be known by using(a) tellg( ) (b) tellp( )(c) seekg( ) (d ) seekp( )

Q22 Which of these stream classes can be used to read data from a file?(a) fstream (b) ifstream( c) ofstream (d ) both (a) & (b)

Q23 Which of these file modes allows to write data anywhere in a file?(a) ios::ate (b) ios::app(c) ios::out (d ) ios::trunk

Q24 Which of these functions allows to change the position of the getpointer?

(a) tellg( ) (b) tellp( )

Page 47: CLASS – XII COMPUTER SCIENCE Notes by Avinash …cs-4u.weebly.com/uploads/3/1/1/7/31171217/mcq_cs_class_xii.pdf · 䅍ⴠ睷眮捳ⴴ甮睥敢汹潭 1 CLASS – XII COMPUTER SCIENCE

AM- www.cs-4u.weebly.com

47

(c) seekg( ) (d ) seekp( )Q25 Which of these refers to the end position of a file?

(a) ios::beg (b) ios::end(c) ios::cur (d ) None of these

Q26 Which of these functions returns a non-zero value if end of file isencountered while reading data from a file ?

(a) eof( ) (b) fail( )(c) bad( ) (d ) good( )

Page 48: CLASS – XII COMPUTER SCIENCE Notes by Avinash …cs-4u.weebly.com/uploads/3/1/1/7/31171217/mcq_cs_class_xii.pdf · 䅍ⴠ睷眮捳ⴴ甮睥敢汹潭 1 CLASS – XII COMPUTER SCIENCE

AM- www.cs-4u.weebly.com

48

POINTERS

1. Which of the following is the proper declaration of a pointer?A. int x;B. int &x;C. ptr x;D. int *x;

2. Which of the following gives the memory address of integer variable a?A. *a;B. a;C. &a;D. address(a);

3. Consider the following statementschar *ptr;ptr = “hello”;cout << *ptr;

What will be printed?

A. first letterB. entire stringC. it is a syntax errorD. last letter

4. Declaration of a pointer reserves memory spaceA. for the object.B. for the pointer.C. both for the object and the pointer.D. none of these.

5. What would be the output of the following?#include<iostream.h>void main(){char *ptr=“abcd”char ch;ch = ++*ptr++;cout<<ch;

Page 49: CLASS – XII COMPUTER SCIENCE Notes by Avinash …cs-4u.weebly.com/uploads/3/1/1/7/31171217/mcq_cs_class_xii.pdf · 䅍ⴠ睷眮捳ⴴ甮睥敢汹潭 1 CLASS – XII COMPUTER SCIENCE

AM- www.cs-4u.weebly.com

49

}A. aB. bC. cD. d

6. Which of the following declarations are illegal?A. void *ptr;B. char *str = “hello”;C. char str = “hello”;D. const *int p1;

7. You have assigned the address of Value to the pointer P, Which statementwill display the value stored in Value?

A. cout<<P;B. cout<<*Value;C. cout<<&P;D. cout<<*<P;

8. A pointer to a block of memory is effectively same as an arrayA. TrueB. False

9. Which of the following gives the value stored at the address pointed to bypointer a?

A. a;B. val(a);C. *a;D. &a;

10. Which of the following gives the memory address of a pointer a?A. a;B. *a;C. &a;D. address(a);

11. What will be the output of this code?

int *p1,*p2;p1=new int;p2=new int;*p1=10;*p2=20;cout<<*p1<< " "<<*p2<<endl;*p1=*p2;

Page 50: CLASS – XII COMPUTER SCIENCE Notes by Avinash …cs-4u.weebly.com/uploads/3/1/1/7/31171217/mcq_cs_class_xii.pdf · 䅍ⴠ睷眮捳ⴴ甮睥敢汹潭 1 CLASS – XII COMPUTER SCIENCE

AM- www.cs-4u.weebly.com

50

cout<<*p1<< " "<<*p2<<endl;*p1=30;cout<<*p1<< " "<<*p2<<endl;

A. 10 2020 2030 20

B. 10 2020 4030 40

C. 20 2020 3020 20

D. None12. The operator used for dereferencing or indirection is ____

A. *B. &C. ->D. –>>

13. Which of the following is illegal?A. int *ip;B. string s, *sp = 0;C. int i; double* dp = &i;D. int *pi = 0;

14. What will happen in this code?int a = 100, b = 200;int *p = &a, *q = &b;p = q;

A. b is assigned to aB. p now points to bC. a is assigned to bD. q now points to a

15. What is the output of this program?

#include <iostream.h>void main(){

int a = 5, b = 10, c = 15;int *arr[ ] = {&a, &b, &c};

Page 51: CLASS – XII COMPUTER SCIENCE Notes by Avinash …cs-4u.weebly.com/uploads/3/1/1/7/31171217/mcq_cs_class_xii.pdf · 䅍ⴠ睷眮捳ⴴ甮睥敢汹潭 1 CLASS – XII COMPUTER SCIENCE

AM- www.cs-4u.weebly.com

51

cout << arr[1];}

A. 5B. 10C. 15D. it will return some random address value

16. What is the output of this program?#include <iostream.h>

void main(){

char arr[20];int i;for(i = 0; i < 10; i++)*(arr + i) = 65 + i;

*(arr + i) = '\0';cout << arr;

}

A. ABCDEFGHIJB. AAAAAAAAAAC. JJJJJJJJD. none of the mentioned

Each time we are assigning 65 + i. In first iteration i = 0 and 65 is assigned.So it will print from A to J.

17. What is the output of this program?#include <iostream.h>int main(){

char *ptr;char Str[] = "abcdefg";ptr = Str;ptr += 5;cout << ptr;return 0;

}A. fgB. cdefC. defg

Page 52: CLASS – XII COMPUTER SCIENCE Notes by Avinash …cs-4u.weebly.com/uploads/3/1/1/7/31171217/mcq_cs_class_xii.pdf · 䅍ⴠ睷眮捳ⴴ甮睥敢汹潭 1 CLASS – XII COMPUTER SCIENCE

AM- www.cs-4u.weebly.com

52

D. abcd18. What is the output of this program?

#include <iostream.h>void main()

{int a[2][4] = {3, 6, 9, 12, 15, 18, 21, 24};cout << *(a[1] + 2) << *(*(a + 1) + 2) << 2[1[a]];

}A. 15 18 21B. 21 21 21C. 24 24 24D. Compile time error

Explanation:a[1][2] means

1 * (4)+2 = 6th element of an array staring from zero.

19. What is the output of this program?#include <iostream.h>

void main(){

int i;char *arr[] = {"C", "C++", "Java", "VBA"};char *(*ptr)[4] = &arr;cout << ++(*ptr)[2];

}A. avaB. JavaC. c++D. compile time error

View AnswerAnswer: aExplanation:In this program we are moving the pointer from first positionto second position and printing the remaining value.

20. What is the output of this program?#include <iostream.h>

void main(){

int arr[] = {4, 5, 6, 7};int *p = (arr + 1);

Page 53: CLASS – XII COMPUTER SCIENCE Notes by Avinash …cs-4u.weebly.com/uploads/3/1/1/7/31171217/mcq_cs_class_xii.pdf · 䅍ⴠ睷眮捳ⴴ甮睥敢汹潭 1 CLASS – XII COMPUTER SCIENCE

AM- www.cs-4u.weebly.com

53

cout << *p;}

A. 4B. 5C. 6D. 7

View AnswerAnswer:bExplanation:In this program, we are making the pointer point to next valueand printing it.

21. What is the output of this program?#include <iostream.h>

void main(){

int arr[] = {4, 5, 6, 7};int *p = (arr + 1);cout << arr;

}A. 4B. 5C. address of arrD. 7

Explanation:As we couted to print only arr, it will print the addressof the array.

22. What is the output of this program?

#include <iostream.h>void main ()

{int numbers[5];int * p;p = numbers; *p = 10;p++; *p = 20;p = &numbers[2]; *p = 30;p = numbers + 3; *p = 40;p = numbers; *(p + 4) = 50;for (int n = 0; n < 5; n++)

cout << numbers[n] << ",";

Page 54: CLASS – XII COMPUTER SCIENCE Notes by Avinash …cs-4u.weebly.com/uploads/3/1/1/7/31171217/mcq_cs_class_xii.pdf · 䅍ⴠ睷眮捳ⴴ甮睥敢汹潭 1 CLASS – XII COMPUTER SCIENCE

AM- www.cs-4u.weebly.com

54

}A. 10, 20, 30, 40, 50B. 1020304050C. compile errorD. runtime error

Explanation:In this program, we are just assigning a value to the array andprinting it and immediatly dereferencing it.

23. What is the output of this program?

#include <iostream.h>int main(){

int arr[] = {4, 5, 6, 7};int *p = (arr + 1);cout << *arr + 9;

}A. 12B. 5C. 13D. error

Explantion:In this program, we are adding the value 9 to the initial value ofthe array, So it’s printing as 13.

24. What is the output of this program?

#include<iostream.h>void main()

{int arr[] = {12, 23, 34, 45};int *ptr = arr;int val = *ptr; cout << val << endl;val = (*ptr)++; cout << val << endl; // first print value then increment (postincrement in value)val = *ptr; cout << val << endl; // only values are changingval = *++ptr; cout << val << endl; // first increment the address and thenprint the value.}

Page 55: CLASS – XII COMPUTER SCIENCE Notes by Avinash …cs-4u.weebly.com/uploads/3/1/1/7/31171217/mcq_cs_class_xii.pdf · 䅍ⴠ睷眮捳ⴴ甮睥敢汹潭 1 CLASS – XII COMPUTER SCIENCE

AM- www.cs-4u.weebly.com

55

A. 12121322

B. 12121423

C. 12131323

D. 12121323

25. What is the output of this program?

#include<iostream.h>

void main(){int arr[] = {12, 23, 34, 45};int *ptr = arr;int val = *ptr; cout << val << endl;val = *ptr++; cout << val << endl; //increment in addressval = *ptr; cout << val << endl;val = *++ptr; cout << val << endl;}

A. 12121322

B. 12122334

C. 12122323

D. 12222323

26. #include<iostream.h>void main()

{int arr[] = {12, 23, 34, 45};int *ptr = arr;int val = *ptr; cout << val << endl;val = *ptr++; cout << val << endl;val = *ptr; cout << val << endl;val = ++*ptr; cout << val << endl;}

A. 12121222

B. 12122324

C. 12122323

D. 22222323

Page 56: CLASS – XII COMPUTER SCIENCE Notes by Avinash …cs-4u.weebly.com/uploads/3/1/1/7/31171217/mcq_cs_class_xii.pdf · 䅍ⴠ睷眮捳ⴴ甮睥敢汹潭 1 CLASS – XII COMPUTER SCIENCE

AM- www.cs-4u.weebly.com

56

UNIT 2: DATA STRUCTURES

ARRAYS1 Which of the following correctly declares an arrayanarray?

A. int anarray[10];B. int anarray;C. an array{10};D. array anarray[10];

2. 2. What is the index number of the last element of an array with 29elements?A. 29B. 28C. 0D. Programmer-defined

3. Which of the following is a two-dimensional array?A. array anarray[20][20];B. int anarray[20][20];C. int array[20, 20];D. char array[20];

4. Which of the following correctly accesses the seventh element stored inGame, an array with 100 elements?A. Game[6];B. Game7];C. Game(7);D. Game;

5. What is an array?a) An array is a series of elements of the same type in contiguous memorylocationsb) An array is a series of elementc) An array is a series of elements of the same type placed in non-contiguous memory locationsd) None of the mentioned

6. Which of the following gives the memory address of the first element inarray?a) array[0];

Page 57: CLASS – XII COMPUTER SCIENCE Notes by Avinash …cs-4u.weebly.com/uploads/3/1/1/7/31171217/mcq_cs_class_xii.pdf · 䅍ⴠ睷眮捳ⴴ甮睥敢汹潭 1 CLASS – XII COMPUTER SCIENCE

AM- www.cs-4u.weebly.com

57

b) array[1];c) array(2);d) array;

7. What is the formula for address calculation in row major order ofelement A[I][J] of an array A [r][c] if B is the Base address, W is theword size, r is number of rows, c is number of columns.

A. Address of element A[I][J] = B+W[c*I+J]

B. Address of element A[I][J] = B+W[c*J+I]

C. Address of element A[I][J] = B+W[r*I+J]

D. Address of element A[I][J] = B+W[r*J+I]

8. What is the formula for address calculation in column major order ofelement A[I][J] of an array A [r][c] if B is the Base address, W is theword size, r is number of rows, c is number of columns.

A. Address of element A[I][J] = B+W[c*I+J]

B. Address of element A[I][J] = B+W[c*J+I]

C. Address of element A[I][J] = B+W[I+r*J]

D. Address of element A[I][J] = B+W[r*J-I]

9. What is the formula for address calculation in row major order ofelement A[I][J] of an array A [Lr…..Ur][Lc…..Uc] if B is the Base address,W is the word size, r is number of rows, c is number of columns.

A. Address of element A[I][J] = B+W[(I-Lr)+r*(J-Lc)]

B. Address of element A[I][J] = B+W[r*(I-Lr)+(J-Lc)]

C. Address of element A[I][J] = B+W[I-Lr)+ c*( (J-Lc)]

D. Address of element A[I][J] = B+W[c*(I-Lr)+(J-Lc)]

10. What is the formula for address calculation in column major order ofelement A[I][J] of an array A [Lr…..Ur][Lc…..Uc] if B is the Base address,W is the word size, r is number of rows, c is number of columns.

A. Address of element A[I][J] = B+W[(I-Lr)+r*(J-Lc)]

B. Address of element A[I][J] = B+W[r*(I-Lr)+(J-Lc)]

Page 58: CLASS – XII COMPUTER SCIENCE Notes by Avinash …cs-4u.weebly.com/uploads/3/1/1/7/31171217/mcq_cs_class_xii.pdf · 䅍ⴠ睷眮捳ⴴ甮睥敢汹潭 1 CLASS – XII COMPUTER SCIENCE

AM- www.cs-4u.weebly.com

58

C. Address of element A[I][J] = B+W[I-Lr)+ c*( (J-Lc)]

D. Address of element A[I][J] = B+W[c*(I-Lr)+(J-Lc)]

11. P is 2-D array [10x5]. Each element of the array is stored in 2 memorylocations. If X[1,1] begins at address 180, find the correct location ofP[2,4]. The arrangement is in row-major.

A. 176B. 190C. 196D. 208

12. A character array A[-20..20],10…35] is stored in memory along withcolumns. The beginning address is 500 the identify the location ofA[0,40].

A. 1234B. 1340C. 2345D. 3245

13. An array P[20][30] is stored in the memory along the column with each ofthe element occupying 4 bytes, find out the Base Address of the array, ifan element P[2][20] is stored at the memory location 5000.

A. 3454B. 3390C. 3392D. 6545

14. If an Array B[11][8] is stored as column wise and B[2][2] is stored at1036 and B[3][3] at 1084, write the addresses of B[5][3] and B[1][1].

Address of B[5][3] is …………..Address of B[1][1] is………….

15. An array Arr [50][100] is stored in the memory along the row with eachelement occupying 2 bytes.Find out the address of the locationArr[20][50],if the location Arr[10][25] is stored at the address 10000.

address of the location Arr[20][50]……………………………16. An array Arr[1….15][1…8] is stored in the memory along the column with

each of itselements occupying 4 bytes . Find out the base address and the addressof an element Arr[3][2], if the location Arr[5][7] is stored at the address2500.

Page 59: CLASS – XII COMPUTER SCIENCE Notes by Avinash …cs-4u.weebly.com/uploads/3/1/1/7/31171217/mcq_cs_class_xii.pdf · 䅍ⴠ睷眮捳ⴴ甮睥敢汹潭 1 CLASS – XII COMPUTER SCIENCE

AM- www.cs-4u.weebly.com

59

Base address is …………………….

Address of an element Arr[3][2 is………………………..

17. Write a function in C++ which an accepts an integer array and its size asargument/ parameters and exchanges the values of first half sideelements with the second half side elements of the array.

Example: If an array of eight elements has initial content as2,4,1,6,7,9,23,10,16

The function should rearrange the array as9,23,10,16,2,4,1,6,7

18. The function definition is given below:void exchange(int a[ ], int n){inti, mid, j, temp;mid=n/2; //divide total no .of elements by 2 and assign the result tomid

if (n%2= = 0)j=mid;elsej=mid+1;

//swap elementsfor(i=0; i<mid; i++, j++)

{temp = a[i];a[i] = a[j];a[j] = temp;

}}

19. Write a function in C++ to print the sum of all the values which are eitherdivisible by 3 or are divisible by 5 present in a two dimensional arraypassed as the argument to the function.

20. Define a function SwapArray(int [ ] , int) that would accept a onedimensional integer array NUMBERS and its size N. The function shouldrearrange the array in such a way that the values of alternate locationsof the array are exchanged ( Assumed the size of the array to be even)Example:If the array initially contains[2,5,9,14,17,8,19,16]

Page 60: CLASS – XII COMPUTER SCIENCE Notes by Avinash …cs-4u.weebly.com/uploads/3/1/1/7/31171217/mcq_cs_class_xii.pdf · 䅍ⴠ睷眮捳ⴴ甮睥敢汹潭 1 CLASS – XII COMPUTER SCIENCE

AM- www.cs-4u.weebly.com

60

then after rearrangement the array should contain[5,2,14,9,8,17,16,19]

Ans void SwapArray(int NUMBERS[ ], int N){inti, temp ;

for ( i =0 ; i<N; i +=2){

temp=NUMBERS[i] ;NUMBERS[i] = NUMBERS[i+1];NUMBERS[i+1] = temp;

}}

21. Write a function in C++ which accepts a character array and its size asarguments and reverse that array without using second array and libraryfunction.Example : if the array is having“Computer Science”

Then after reversal it should rearranged as“ecneicSretupmoC”

22. The function definition is given below:void Reversearray(int a[ ], int size){int temp, i, j;

for(inti = 0, j=size-1;i<j; i++,j--){

temp = a[i];a[i] = a[j];a[j] = temp;

}}

Ans An array of a structure Student, S is required to be arranged indescending order of marks.Write a C++ function to arrange the same with the help of bubble sort.The array and its size is required to be passed as parameters to thefunction.Definition of structure student is as followsstruct Student{introllno;char name[20];

Array of structures+

Bubble sort

Page 61: CLASS – XII COMPUTER SCIENCE Notes by Avinash …cs-4u.weebly.com/uploads/3/1/1/7/31171217/mcq_cs_class_xii.pdf · 䅍ⴠ睷眮捳ⴴ甮睥敢汹潭 1 CLASS – XII COMPUTER SCIENCE

AM- www.cs-4u.weebly.com

61

float marks;};

23. void Arrange ( Student S[ ], int size){inti,j;Student temp;cout<< “ Arranging in Descending Order\n\n”;for(i=0; i<size;i++)

for(j=0 ; j<size-1-i; j++){

if( S [ j ] . marks < S [ j+1 ] .marks){

temp = S[j];S[ j ] = S[ j+1 ];S[j+1] = temp;

}}

}Ans An array E containing elements of structure Employee is required to be

arranged in descending order of salary. Write a C++ function to arrangethe same with the help of Selection sort. The array and its size isrequired to be passed as parameters to the functions. Definitions of thestructure is as follows:struct Employee{intempno;char Ename[20];float salary;};

24. void Arrange ( Employee E[ ], int size){inti,j, temp ;

Employee temp;cout<< “ Arranging in Descending Order\n\n”;

for(i=0; i<size;i++){

highest=E[i].salary;pos=i;

for(j=i+1 ; j<size; j++)

Array of structures+

Selection sort

Page 62: CLASS – XII COMPUTER SCIENCE Notes by Avinash …cs-4u.weebly.com/uploads/3/1/1/7/31171217/mcq_cs_class_xii.pdf · 䅍ⴠ睷眮捳ⴴ甮睥敢汹潭 1 CLASS – XII COMPUTER SCIENCE

AM- www.cs-4u.weebly.com

62

{if( E [ j ] . salary > highest )

{highest=E [j].salary;

pos = j;}

}temp=E[i] ;E[i]=E[pos];E[pos]=temp;

}}

Ans: Write a function in C++ to merge the contents of two sorted arrays A andB, into the third array C. Assume array A is sorted in ascending order, Bis sorted in descending order, the resultant array is required to be inascending.

25. Write a function in C++ to merge the contents of two sorted arrays A andB, into the third array C. Assume array A is sorted in descending order, Bis sorted in descending order, the resultant array is required to be inascending.

Ans: Write a function in C++ to merge the contents of two sorted arrays A andB, into the third array C. Assume array A is sorted in ascending order, Bis sorted in ascending order, the resultant array is required to be indescending.

26. Write a function in C++ to merge the contents of two sorted arrays A andB, into the third array C. Assume array A is sorted in ascending order, Bis sorted in ascending order, the resultant array is required to be inascending.

27. Write a function in C++ to merge the contents of two sorted arrays A andB, into the third array C. Assume array A is sorted in descending order, Bis sorted in descending order, the resultant array is required to be indescending.

Page 63: CLASS – XII COMPUTER SCIENCE Notes by Avinash …cs-4u.weebly.com/uploads/3/1/1/7/31171217/mcq_cs_class_xii.pdf · 䅍ⴠ睷眮捳ⴴ甮睥敢汹潭 1 CLASS – XII COMPUTER SCIENCE

AM- www.cs-4u.weebly.com

63

STACK, QUEUE AND LINKED LIST

1. Linked list is a collection of : -A. Data elements, called nodes pointing to the next nodes by means of

pointers.B. Data elements, called nodes pointing to the next nodes by means of

integersC. Data elements, called nodesD. B & C

2. A stack is a linear list implemented inA. LIFOB. FIFOC. SIFOD. FISO

3. A queue is a linear list implemented inA. LIFOB. FIFOC. SIFOD. FISO

4. Which memory allocation technique reserves fixed amount of memorybefore actual processing takes place?

A. Dynamic memory allocationB. Static memory allocationC. Root memory allocationD. None of them

5. Which memory allocation technique allocates an amount of memory duringprogram run?

A. Dynamic memory allocationB. Static memory allocationC. Root memory allocationD. None of them

6. Which data structure works on static memory allocation?A. Linked ListB. Trees

Page 64: CLASS – XII COMPUTER SCIENCE Notes by Avinash …cs-4u.weebly.com/uploads/3/1/1/7/31171217/mcq_cs_class_xii.pdf · 䅍ⴠ睷眮捳ⴴ甮睥敢汹潭 1 CLASS – XII COMPUTER SCIENCE

AM- www.cs-4u.weebly.com

64

C. StackD. Array

7. Which data structure works on dynamic memory allocation?A. Linked ListB. StructuresC. ArrayD. Pointer

8. Write the full form of FIFO and LIFO.FIFO………………………………………LIFO…………………………….

9. An insertion operation in a stack is called: -A. POPB. PUSHC. ForceD. None of them

10. A delete operation in a stack is called: -A. POPB. PUSHC. ForceD. None of them

11. Identify the name of the pointer generally used to implement stackA. RearB. FrontC. TopD. B&C

12. Identify the name of the pointer generally used to insert new element in aqueue

A. RearB. FrontC. TopD. B&C

13. Identify the name of the pointer generally used to delete an existingelement from a queue

A. RearB. FrontC. TopD. B&C

Page 65: CLASS – XII COMPUTER SCIENCE Notes by Avinash …cs-4u.weebly.com/uploads/3/1/1/7/31171217/mcq_cs_class_xii.pdf · 䅍ⴠ睷眮捳ⴴ甮睥敢汹潭 1 CLASS – XII COMPUTER SCIENCE

AM- www.cs-4u.weebly.com

65

14. What is underflow in an array/stack/queue?A. If one tries to delete an element from an empty array/stack/queue.B. If one tries to delete an element from a partially empty

array/stack/queue.C. If one tries to insert an element into an empty array/stack/queue.D. B & C

15. What is overflow in an array/stack/queue?A. If one tries to insert an element into full array/stack/queue.B. If one tries to delete an element from a partially filled

array/stack/queue..C. If one tries to insert an element into a partially filled

array/stack/queue.D. None of them

16. What is the postfix form of the following expressiona*(b+(c+d)*(e+f)/g/*h

A. Abcdef++*g/+*h*B. Abcd+ef+*g/+*h*C. Abcd+ef+*g/+*h+D. Abc*d+ef+*g/+*h

17. What is the postfix form of the following expressiona+[(b+c)+(d+e)*f]/g

A. A+bc+de+f*+g/B. Ab*c+de+f+g/+C. Abc+de+f*+g/+D. Both A & B

18. What is the postfix form of the following expressionNOT a OR NOT b NOT c

A. a NOT b NOT c NOT AND ORB. a NOT NOT bc NOT AND ORC. a NOT NOT b OR c NOT AND

Page 66: CLASS – XII COMPUTER SCIENCE Notes by Avinash …cs-4u.weebly.com/uploads/3/1/1/7/31171217/mcq_cs_class_xii.pdf · 䅍ⴠ睷眮捳ⴴ甮睥敢汹潭 1 CLASS – XII COMPUTER SCIENCE

AM- www.cs-4u.weebly.com

66

D. a AND NOT b OR c NOT NOT

19. Find the Correct choice after calculating following postfix notation.

100,40,+,20,14,-,8,*,+

A. 198

B. 188

C. 78

D. None of them

20. Find the correct postfix notation of following expression :

(True && False ) || ! (False ||True)

A. True False && False True || ! ||

B. True True && False True || ! ||

C. True False && True True || ! ||

D. True False && False False || ! ||

Page 67: CLASS – XII COMPUTER SCIENCE Notes by Avinash …cs-4u.weebly.com/uploads/3/1/1/7/31171217/mcq_cs_class_xii.pdf · 䅍ⴠ睷眮捳ⴴ甮睥敢汹潭 1 CLASS – XII COMPUTER SCIENCE

AM- www.cs-4u.weebly.com

67

UNIT 3: DATABASES MANAGEMENT SYSTEMAND SQL

1 The collection of related data from which users can efficiently retrievethe desired information is known as

(a) Database (b) Table(c) Relation (c) DBMS

2 The software that allows the user to access the data contained in adatabase is known are

(a) Database (b) Table(c ) Relation (d) DBMS

3 The advantages of DBMS are(a) Data redundancy (b) Data Security(c ) Data integrity (d) All of the above

4 A ....... holds one piece of information about an item or subject in thedatabase.

(a) Record (b) field(c ) domain (d) None of these

5 A ....... is a collection of multiple related fields that can be treated as aunit.

(a) Record (b) field(c ) domain (d) None of these

6 The ................ data model was developed by E F Codd of IBM in 1970.(a) Relational (b) Network(c ) Hierarchical (d) None of these

7 Name the data model in which all the tables are linked with each otherusing a common attribute in the tables.

(a) Relational (b) Network(c ) Hierarchical (d) None of these

8 In relational data model , collection of logically records are known as(a) Relation (b) Table(c ) Both (a) & (b) (d) None of these

9 The rows of a relation are referred to(a) tuples (b) attributes(c ) domain (d) None of these

10 The columns of a relation are referred to(a) tuples (b) attributes(c ) domain (d) None of these

11 The set of permissible values of the same type for a column is known as(a) tuples (b) attributes

Page 68: CLASS – XII COMPUTER SCIENCE Notes by Avinash …cs-4u.weebly.com/uploads/3/1/1/7/31171217/mcq_cs_class_xii.pdf · 䅍ⴠ睷眮捳ⴴ甮睥敢汹潭 1 CLASS – XII COMPUTER SCIENCE

AM- www.cs-4u.weebly.com

68

(c ) domain (d) None of these

12 The number of attributes in a relation is called the ................. of a relation.(a) Degree (b) Cardinality(c ) domain (d) None of these

13 The number of tuples in a relation is called the ................. of a relation.(a) Degree (b) Cardinality(c ) domain (d) None of these

14 A ....... (key) is an attribute or set of attributes that ensures that no tworows of the relation are identical.

15 A set of one or more attributes that can uniquely identified tuples withinthe relation is known as

(a) Primary Key (b) Alternate Key(c ) Foreign Key (d) None of these

16 All attribute combinations inside a relation that can serve as primary keyare known as

(a) Candidate Key (b) Alternate Key(c ) Foreign Key (d) None of these

17 A candidate key that is not the primary key is called(a) Candidate Key (b) Alternate Key(c ) Foreign Key (d) None of these

18 The operation that is used to extract specific tuples from a given relationthat satisfy a given condition for a relation

(a) SELECT (b) PROJECT(c ) UNION (d) INTERSECTION

19 The operation that is used to extract specific attributes from all thetuples of a relation.

(a) SELECT (b) PROJECT(c ) UNION (d) INTERSECTION

20 The operation that displays all the tuples of both the relations as theoutput with the duplicate tuples eliminated.

(a) SELECT (b) PROJECT(c ) UNION (d) INTERSECTION

21 The operation that displays all the tuples that exist in both the relationsand discards the rest of the tuples.

(a) SELECT (b) PROJECT(c ) UNION (d) INTERSECTION

22 The operation that displays the tuples that exist in one table but inot inthe other table.

(a) SET DIFFERENCE (b) PROJECT(c ) CARTESIAN PRODUCT (d) INTERSECTION

Page 69: CLASS – XII COMPUTER SCIENCE Notes by Avinash …cs-4u.weebly.com/uploads/3/1/1/7/31171217/mcq_cs_class_xii.pdf · 䅍ⴠ睷眮捳ⴴ甮睥敢汹潭 1 CLASS – XII COMPUTER SCIENCE

AM- www.cs-4u.weebly.com

69

23 The operation that displays the third relation that includes all the tuplesfrom the first relation combined with every tuple of the second relation.

(a) SET DIFFERENCE (b) PROJECT(c ) CARTESIAN PRODUCT (d) INTERSECTION

24 Standard language for RDBMS is(a) SQL (b) PASCAL(c ) JAVA (d) C++

25 Oracle, Sybase, Microsoft SQL Server, Access, Ingres etc are theexample of

(a) Programming Language (b) RDBMS(c ) Computer Hardware (d) OOPS

26 In SQL, the commands that are used to create, manipulate and delete adatabase and its objects are known as

(a) DDL (b) DML(c ) DCL (d) None of these

27 In SQL, the commands that are used to manipulate the data in the tableare known as

(a) DDL (b) DML(c ) DCL (d) None of these

28 In SQL, the commands that are used to grant or revoke access rights tothe database users are known as

(a) DDL (b) DML(c ) DCL (d) None of these

29 A condition or a check that is applicable to an attribute or a set ofattributes in a table is known as

(a) constraint (b) constant(c ) variable (d) None of these

30 The constraint that ensures that no two rows are identical(a) NOT NULL (b) DEFAULT(c ) UNIQUE (d) None of these

31 The constraint that doesn’t allow NULL values in a specified column.(a) NOT NULL (b) DEFAULT(c ) UNIQUE (d) None of these

32 The keyword that is used to display the results of the SELECT commandafter eliminating the duplicate rows

(a) ALL (b) DISTINCT(c ) UNIQUE (d) None of these

33 The clause that allows sorting of the query results by one or more columns(a) GROUP BY (b) ORDER BY

Page 70: CLASS – XII COMPUTER SCIENCE Notes by Avinash …cs-4u.weebly.com/uploads/3/1/1/7/31171217/mcq_cs_class_xii.pdf · 䅍ⴠ睷眮捳ⴴ甮睥敢汹潭 1 CLASS – XII COMPUTER SCIENCE

AM- www.cs-4u.weebly.com

70

(c ) ASC (d) None of these

34 The clause lets the user to split up the values in a column into subsets.(a) GROUP BY (b) ORDER BY(c ) ASC (d) None of these

35 A virtual table whose contents are defined by a query(a) VIEW (b) TABLE(c ) RELATION (d) None of these

36 The SQL command that is used to remove an entire row of data from atable

(a) DELETE (b) DROP(c ) Update (d) None of these

37 Which of the following SQL Commands is used to modify the structure of atable

(a) DROP TABLE (b) ALTER TABLE(c ) CREATE TABLE (d) None of these

38 Which of these functions is used to find the total summation of a column(a) ADD (b) COUNT(c ) SUM (d) AVG

39 Which of these clause is not used with SELECT command(a) MODIFY (b) WHERE(c ) ORDER BY (d) GROUP BY

40 Which of these is not an aggregate function in SQL?(a) COUNT(*) (b) AVG(c ) MIN( ) (d) Date

41 Which of these clauses is used for pattern matching?(a) LIKE (b) BETWEEN AND(c ) IN (d) IS NULL

Page 71: CLASS – XII COMPUTER SCIENCE Notes by Avinash …cs-4u.weebly.com/uploads/3/1/1/7/31171217/mcq_cs_class_xii.pdf · 䅍ⴠ睷眮捳ⴴ甮睥敢汹潭 1 CLASS – XII COMPUTER SCIENCE

AM- www.cs-4u.weebly.com

71

UNIT 4: BOOLEAN ALGEBRA

Fill in the blanks Questions1 In Boolean algebra, a statement can have only two values, .............(TRUE)

or ...............(FALSE).2 Boolean algebra uses upper case letters such as A,B,X,Y etc. , to

represent propositions instead of words. These letters are known as........(literals).

3 In 1854, Boolean algebra was originally developed by(a) George Boole (b) Konard Zuse(c) Claude Shannon (d) John Von Neumann

4 The two values TRUE and FALSE used in Boolean algebra are known as................... ( Logical or Boolean ) constants.

5 The statement that can only have either the TRUE or FALSE value isknown as a .......................... (Logical) statement.

6 The variables that can only take either of the two values TRUE or FALSEare called .....................( logical or binary valued or binary valuesquantities ) variables.

7 In Boolean algebra the logical statements are represented by letters likeA,B,X,Y etc. Hence A,B,X,Y are referred to as ................(logical) variables.

8 The Boolean operators are(a) NOT (bar) (b) OR ( +)(c ) AND ( .) (d) All of the above

9 Correct example of compound statement is(a) A AND B (b) B NOT C( c ) A AND B NOT C (d) None of these

10 A unique representation of a Boolean expression in a tabular form is knownas a .......................(truth table).

11 If there are n number of variables in an expression, then the truth tablecomprises .............. no. Of rows.

(a) 2n (b) n2

( c ) 2n (d) None of these12 The system of Boolean algebra is said to be closed with respect to any

binary operator if for every two Boolean values it produces a Booleanresult. This property is known as

(a) Closure Property (b) Commutative( c ) Associative (d) None of these

13 In which law, the logical addition and logical multiplication of two variablesis commutative in nature.

Page 72: CLASS – XII COMPUTER SCIENCE Notes by Avinash …cs-4u.weebly.com/uploads/3/1/1/7/31171217/mcq_cs_class_xii.pdf · 䅍ⴠ睷眮捳ⴴ甮睥敢汹潭 1 CLASS – XII COMPUTER SCIENCE

AM- www.cs-4u.weebly.com

72

(a) Associative (b) Commutative(c) Distributive (d) None of these

14 According to Commutative law , which of the following statement iscorrect

(a) A+B = B+A (b) A.B = B.A(c) Both (a) & (b) (d) None of these

15 In which law, the logical addition and logical multiplication of threevariables are associative in nature.

(b) Associative (b) Commutative(c) Inverse (d) None of these

16 According to Associative law , which of the following statement iscorrect

(a) A+(B+C) = (A+B)+C (b) A.(B.C) = (A.B).C(c) Both (a) & (b) (d) None of these

17 In which law, the logical addition and logical multiplication of threevariables is distributive in nature.

(a) Associative (b) Commutative(c) Distributive (d) None of these

18 According to Distributive law , which of the following statement iscorrect

(a) A.(B+C) = (A.B)+(A.C) (b) A+(B.C) = (A+B).(A+C)(c) Both (a) & (b) (d) None of these

19 In which law, the logical addition and logical multiplication of two variablesis absorptive in nature.

(a) Absorption (b) De Morgan(c) Inverse (d) None of these

20 According to Absorption law , which of the following statement is correct(a) A+A.B = A (b) A.(A+B) = A(c) Both (a) & (b) (d) None of these

21 Which one of the following is best correct for Idempotence law, whichstates that for every logical variable A there exists A such that

(a) A + A = A (b) A.A = A(c) Both (a) & (b) (d) None of these

22 Which one of the following is best correct for Inverse law, which statesthat for every logical variable A there exists A’ such that

(a) A + Ā = 1 (b) A. Ā = 0(c) Both (a) & (b) (d) None of these

23 Which one of the following is best correct for Involution law, whichstates that for every logical variable A there exists A’ such that

Page 73: CLASS – XII COMPUTER SCIENCE Notes by Avinash …cs-4u.weebly.com/uploads/3/1/1/7/31171217/mcq_cs_class_xii.pdf · 䅍ⴠ睷眮捳ⴴ甮睥敢汹潭 1 CLASS – XII COMPUTER SCIENCE

AM- www.cs-4u.weebly.com

73

(a) ((A’)’) = A (b) ((A’)’) = 1(c) ((A’)’) = 0 (d) None of these

24 De Morgan’s Law states that for every two logical variables A and B(a) (A +B)’ = A’. B’ (b) (A.B)’ = A’ + B’(c) Both (a) & (b) (d) None of these

25 The principle that states that any valid Boolean expression of Booleanalgebra remains valid even if the logical operators and the logicalconstants in the expression are interchanged.

(a) Duality Principle (b) Commutative Principle(c) Associative Principle (d) None of these

26 The dual of an expression can be obtained by following these rules(a) Interchanging OR and AND operators.(b) Interchanging ‘+’ and ‘.’ Signs.(c) Replacing 0s by 1s and 1s by 0s.(d) All of the above

27 The term in a Boolean expression, which is a logical multiplication of twoor more Boolean variables (either in normal or complemented form) iscalled

(a) Product term (b) Sum term(c) Minterm (d) Maxterm

28 The term in a Boolean expression, which is a logical addition of two ormore Boolean variables (either in normal or complemented form) is called

(a) Product term (b) Sum term(c) Minterm (d) Maxterm

29 A product term in which each of the n variables of a Boolean functionappears once ((either in normal or complemented form) is called

(a) Product term (b) Sum term(c) Minterm (d) Maxterm

30 A sum term in which each of the n variables of a Boolean function appearsonce ((either in normal or complemented form) is called

(a) Product term (b) Sum term(c) Minterm (d) Maxterm

31 Any Boolean expression that is either in the form of sum of productterms (SOP) or product of sum terms ( POS) is called

(a) Standard form (b) Non standard form(c) Canonical form (d) None of the above

32 Any Boolean expression that is a combination of sum terms and productterms is said to be in

Page 74: CLASS – XII COMPUTER SCIENCE Notes by Avinash …cs-4u.weebly.com/uploads/3/1/1/7/31171217/mcq_cs_class_xii.pdf · 䅍ⴠ睷眮捳ⴴ甮睥敢汹潭 1 CLASS – XII COMPUTER SCIENCE

AM- www.cs-4u.weebly.com

74

(a) Standard form (b) Non standard form(c) Canonical form (d) None of the above

33 Any Boolean expression that is either in the form of sum of minterms orproduct of maxterms is said to be in

(a) Standard form (b) Non standard form(c) Canonical form (d) None of the above

34 Canonical SOP form of the Boolean functions is obtained by doing thefollowing in correct order

i. Preparing a truth table for the given Boolean functionii. Obtain the minterms by complementing the variable if the

corresponding bit is 0, otherwise keep it in normal form.iii. Perform the logical addition between the terms to obtain the

canonical form of the expression.(a) i, ii, iii (b) ii, i, iii(c ) iii, ii, i (d) none of these

35 Canonical POS form of the Boolean functions is obtained by doing thefollowing in correct order

I. Preparing a truth table for the given Boolean functionII. Obtain the maxterms by complementing the variable if the

corresponding bit is 1, otherwise keep it in normal form.III. Perform the logical multiplication between the terms to obtain

the canonical form of the expression.( a ) I, II, III (b) II, I, III(c ) III, II, I (d) none of these

36 The Boolean expression that is obtained after simplification is known asthe .................(optimal) form of the Boolean expression.

37 The optimal form of a Boolean expression can be achieved by...................(algebraic) approach and ......................( graphical) approach.

38 The map method that is the graphical representation of a truth table issimplified by ...................................( Karnaugh Map or K-map).

39 The best approach to solve any problem is(a) Graphical Approach (b) Algebraic Approach( c ) Both (a) and (b) (d) None of these

40 The minterms in K-map are represented by ..........(ones) and maxterms arerepresented by ..............( Zeros)

41 In general, if a Boolean function has ‘n’ number of variables, the K-map willhave .................( 2n) cells.

42 Which one is the correct progression of the values in K-map(a) 00,01,11,10 (b) 00,01,10,11

Page 75: CLASS – XII COMPUTER SCIENCE Notes by Avinash …cs-4u.weebly.com/uploads/3/1/1/7/31171217/mcq_cs_class_xii.pdf · 䅍ⴠ睷眮捳ⴴ甮睥敢汹潭 1 CLASS – XII COMPUTER SCIENCE

AM- www.cs-4u.weebly.com

75

( c) 00,11,01,10 (d) None of these43 In K-map, grouping of terms is always done in the power of ............(2).44 A group of two 1s is called a .............(pair), a group of four 1s is called a

....... (quad) and a group of eight 1s is known as an .............(octet).45 In K-map, a pair cancels ............(one) variable, a quad cancels ...........(two)

variables and an octet cancels ..............(three) variables.46 An electronic circuit that takes one or more input signals and produces

only one output signal is called a ............( gate).47 Which of these are basic gates are

(a) NOT (b) AND(b) OR (d) All of these

48 Which of these is Universal gate(a) NAND (b) NOR(c ) Both (a) & (b) (d) None of these

49 Which of these performs the logical addition in a Boolean algebra(a) OR (b) AND(c ) NOT (d) NAND

50 Which of these is also known as complement operator?(a) OR (b) AND(c ) NOT (d) NAND

51 Which of these is a valid complemented OR gate?(a) OR (b) XOR(c ) XNOR (d) NOR

Page 76: CLASS – XII COMPUTER SCIENCE Notes by Avinash …cs-4u.weebly.com/uploads/3/1/1/7/31171217/mcq_cs_class_xii.pdf · 䅍ⴠ睷眮捳ⴴ甮睥敢汹潭 1 CLASS – XII COMPUTER SCIENCE

AM- www.cs-4u.weebly.com

76

UNIT 5: NETWORKING AND OPEN SOURCESOFTWARE

Fill in the blanks Questions1 The foundation of computer networks was laid in 1969 by

(a) Department of Defence ( DOD) of United States(b) Soviet Union(c) National Science Foundation(d) None of these

2 The first computer network name was(a) ARPANET (b) Internet( c ) Intranet ( d) None of these

3 A network of network is called(a) ARPANET (b) Internet( c ) Intranet ( d) None of these

4 The application that allows two or more users to communicate with eachother in the real time 3D environment

(a) Interspace (b) Internet( c ) Intranet ( d) None of these

5 A company own network is known as(a) Interspace (b) Internet( c ) Intranet ( d) None of these

6 A collection of linked documents or pages, stored on millions of computersand distributed across the Internet is known as

(a) Webpage (b) website( c ) WWW ( d) None of these

7 The switching technique in which path is established in advance known as(a) Circuit Switching (b) Message Switching( c ) Packet Switching ( d) None of these

8 The switching technique that is based on store and forward techniqueknown as

(a) Circuit Switching (b) Message Switching( c ) Packet Switching ( d) None of these

9 The switching technique in which message follows through multiple routesknown as

(a) Circuit Switching (b) Message Switching( c ) Packet Switching ( d) None of these

10 The path or the circuit across which data is transferred between nodes,devices, servers etc. is known as

Page 77: CLASS – XII COMPUTER SCIENCE Notes by Avinash …cs-4u.weebly.com/uploads/3/1/1/7/31171217/mcq_cs_class_xii.pdf · 䅍ⴠ睷眮捳ⴴ甮睥敢汹潭 1 CLASS – XII COMPUTER SCIENCE

AM- www.cs-4u.weebly.com

77

(a) Channel (b) wireless( c ) satellite ( d) None of these

11 The maximum volume of data that can be transferred over anycommunication channel at a given point of time is known as

(a) Bandwidth (b) Data Transfer rate( c ) Baud ( d) None of these

12 The unit of bandwidth in analog system is(a) bits per second (b) hertz( c ) baud ( d) None of these

13 The unit of bandwidth in digital system is(a) bits per second (b) hertz( c ) baud ( d) None of these

14 The amount of data transferred per second by the communication channelfrom one point to another is known as

(a) Bandwidth (b) Data Transfer rate( c ) Baud ( d) None of these

15 The unit of data transfer rate is(a) bits per second (b) bytes per second( c ) baud ( d) All of the above

16 The inexpensive transmission media that is used for transmission ofanalog as well as digital signals

(a) Twisted Pair Cable (b) Co-axial Cable( c ) Optical Fibre ( d) None of these

17 The transmission media that are capable of transmitting digital signals ata very high speed with bandwidth 1 GHz and are immune to noise

(a) Twisted Pair Cable (b) Co-axial Cable( c ) Optical Fibre ( d) None of these

18 The transmission media that can transmit data over long distance withhigh security with bandwidth up to 10Gbps

(a) Twisted Pair Cable (b) Co-axial Cable( c ) Optical Fibre ( d) None of these

19 The high frequency waves used for short range communication and areused in TV remotes, garage doors, wireless speakers

(a) Microwave (b) Radio Wave( c ) Infrared Wave ( d) None of these

20 The transmission media that facilitates mobility for long distances are(a) Microwave (b) Radio Wave( c ) Infrared Wave ( d) None of these

21 The line of sight transmission media that facilitates easy communicationin mountainous areas and over oceans

(a) Microwave (b) Radio Wave

Page 78: CLASS – XII COMPUTER SCIENCE Notes by Avinash …cs-4u.weebly.com/uploads/3/1/1/7/31171217/mcq_cs_class_xii.pdf · 䅍ⴠ睷眮捳ⴴ甮睥敢汹潭 1 CLASS – XII COMPUTER SCIENCE

AM- www.cs-4u.weebly.com

78

( c ) Infrared Wave ( d) None of these

22 The transmission media that covered a quite large and there is no line ofsight restriction is

(a) Microwave (b) Radio Wave( c ) Infrared Wave ( d) Satellite

23 The device that convert analog signal into digital and digital signal intoanalog is known as

(a) MODEM (b) HUB( c ) SWITCH ( d) Gateway

24 The multi port device that works on IP addresses and broadcast thesignals is

(a) MODEM (b) HUB( c ) SWITCH ( d) Gateway

25 The network device that works on the physical address and filter thenetwork signals is

(a) MODEM (b) HUB( c ) SWITCH ( d) Gateway

26 An interconnecting device which joins two dissimilar networks with thehelp of different protocols

(a) MODEM (b) HUB( c ) SWITCH ( d) Gateway

27 The four wire connector that is used to connect telephone network(a) RJ45 (b) RJ11( c ) Ethernet ( d) None of these

28 The eight wire connector that is used to connect Ethernet network orcomputer network

(a) RJ45 (b) RJ11( c ) Ethernet ( d) None of these

29 A privately owned computer network that is confined to an area of fewkilometres

(a) LAN (b) MAN( c ) WAN ( d) None of these

30 A computer network usually spreading over a metropolitan area such as acity and the suburbs

(a) LAN (b) MAN( c ) WAN ( d) None of these

31 A computer network that spreads over a large geographical area like acountry or a continent

(a) LAN (b) MAN( c ) WAN ( d) None of these

Page 79: CLASS – XII COMPUTER SCIENCE Notes by Avinash …cs-4u.weebly.com/uploads/3/1/1/7/31171217/mcq_cs_class_xii.pdf · 䅍ⴠ睷眮捳ⴴ甮睥敢汹潭 1 CLASS – XII COMPUTER SCIENCE

AM- www.cs-4u.weebly.com

79

32 The topology that uses a common single cable to connect all theworkstations

(a) Bus (b) Star(c ) Tree (d) None of these

33 The topology in which the devices are connected through a centralizednetwork component known as hub or switch

(a) Bus (b) Star(c ) Tree (d) None of these

34 The topology that combines the characteristics of the linear bus and thestar topology known as

(a) Bus (b) Star(c ) Tree (d) None of these

35 The layered set of protocols that handles the way data is transmittedacross Internet

(a) TCP / IP (b) FTP(c ) PPP (d) Telnet

36 A Protocol that is used to transfer information between computers on theInternet

(a) TCP / IP (b) FTP(c ) PPP (d) Telnet

37 The protocol that provides the ability to transport TCP / IP traffic overserial lines

(a) SLIP / PPP (b) FTP(c ) Telnet (d) None of these

38 The protocol that is used to send the e-mail over Internet(a) SMTP (b) FTP(c ) POP3 (d) Telnet

39 The protocol that is used to receive the e-mail over Internet(a) SMTP (b) FTP(c ) POP3 (d) Telnet

40 The protocol that is used for chat and video conferencing(a) SMTP (b) FTP(c ) POP3 (d) VOIP

41 A non self replicating program that appears to perform a desirablefunction for the user but instead facilitates unauthorized access to theuser's computer system.

(a) Virus (b) WORM(c ) Trojan Horse (d) Spam

Page 80: CLASS – XII COMPUTER SCIENCE Notes by Avinash …cs-4u.weebly.com/uploads/3/1/1/7/31171217/mcq_cs_class_xii.pdf · 䅍ⴠ睷眮捳ⴴ甮睥敢汹潭 1 CLASS – XII COMPUTER SCIENCE

AM- www.cs-4u.weebly.com

80

42 A program that is capable of replicating itself on a computer network(a) Virus (b) WORM(c ) Trojan Horse (d) Spam

43 A software program that is capable of reproducing itself the help ofother executable files

(a) Virus (b) WORM(c ) Trojan Horse (d) Spam

44 Electronic junk mail are known as(a) Virus (b) WORM(c ) Trojan Horse (d) Spam

45 Which one of the following is not a client side scripting language(a) VB Script (b) Java Script(c ) PHP (d) ASP

46 Which one of the following is not a server side scripting language(a) JSP (b) Java Script(c ) PHP (d) ASP

47 The software that is owned by an individual or a company(a) Proprietary (b) Open Source(c ) Freeware (d) Shareware

48 The software whose source code is freely available(a) Proprietary (b) Open Source(c ) Freeware (d) Shareware

49 The software which are available freely and whose source code may ormay not be free

(a) Proprietary (b) Open Source(c ) Freeware (d) Shareware

50 Software that is available free of charge and often distributed informallyfor evaluation, after which a fee may be requested for

(a) Proprietary (b) Open Source(c ) Freeware (d) Shareware

51 The computing that relies on sharing computing resources rather thanhaving local servers or personal devices to handle applications.

(a) Cloud Computing (b) Network Computing(c ) Mobile Computing (d) None of these

52 The cloud infrastructure operated solely for a single organization,whether managed internally or by a third-party ...

(a) Private Cloud (b) Public Cloud(c ) Community Cloud (d) Hybrid Cloud

Page 81: CLASS – XII COMPUTER SCIENCE Notes by Avinash …cs-4u.weebly.com/uploads/3/1/1/7/31171217/mcq_cs_class_xii.pdf · 䅍ⴠ睷眮捳ⴴ甮睥敢汹潭 1 CLASS – XII COMPUTER SCIENCE

AM- www.cs-4u.weebly.com

81

53 The cloud computing in which the services are rendered over a networkthat is open for public use.

(a) Private Cloud (b) Public Cloud(c ) Community Cloud (d) Hybrid Cloud

54 The cloud computing that is the combination of two or more clouds(a) Private Cloud (b) Public Cloud(c ) Community Cloud (d) Hybrid Cloud

55 The open forum for discussing, sharing, and collaborating on CloudComputing

(a) Private Cloud (b) Public Cloud(c ) Community Cloud (d) Hybrid Cloud